SlideShare a Scribd company logo
By: Sean McLaughlin
   “An enterprise-wide service (i.e. data integrity, user identification
    and authentication, user non-repudiation, data confidentiality,
    encryption, and digital signature) that supports digital signatures
    and other public key-based security mechanisms for Department
    of Defense functional enterprise programs, including generation,
    production, distribution, control, and accounting of public key
    certificates. A public key infrastructure provides the means to bind
    public keys to their owners and helps in the distribution of reliable
    public keys in large heterogeneous networks. Public keys are
    bound to their owners by public key certificates. These certificates
    contain information such as the owner's name and the associated
    public key and are issued by a reliable certification authority. Also
    called PKI.” (Dictionary of Military and Associated Terms, 2005)”
   Creating, Distributing, and Storing Digital
    Certificates
   Pair of Public and Private (Secret) Key
     Managed by a Certificate Authority
     Public Key= visible to all
     Private key= secret (only certain users have
      access)
   Private key encrypts and decrypts messages
   Certificate Authority (CA)
     Responsible for issuing and verifying certificates
   Registration Authority (RA)
     Identify and Verify the user before CA
   Central Directory
     Secure location to store and index keys from CA
   Certificate Management Authority
     Determines roles and responsibilities in
     management and distribution of certificates.

More Related Content

DOC
Certification authority
PDF
The world of encryption
PDF
Security aspects on blockchain white paper
PPTX
Trust, Blockchains, and Self-Soveriegn Identity
DOCX
Certificate Locker.docx
PDF
Blockchain Security and Privacy
PPTX
Public key infrastructure
Certification authority
The world of encryption
Security aspects on blockchain white paper
Trust, Blockchains, and Self-Soveriegn Identity
Certificate Locker.docx
Blockchain Security and Privacy
Public key infrastructure

What's hot (20)

PDF
Blockchain & the future of data management
PDF
Certification Authority - Sergio Lietti
PDF
Towards Self Sovereign Identity 20180508
PDF
What to look for in a hosted supplier
PDF
Blockchain-based Solutions for Identity & Access Management
PPT
Information and data security key management and distribution
PDF
Presentation on third party authentication, virtual private networking (vpn),...
PDF
PKI Industry growth in Bangladesh
PPTX
The Blockchain and the Future of Cybersecurity
PPTX
ReCheck - secure digitalization
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
PPTX
Alpha Education
PDF
User Management, Enablement, Directory
PPTX
ReCheck's solution for decentralised login
PDF
Security Model of Blockchain
PPTX
Blockchain consulting services
PDF
PoW vs. PoS - Key Differences
PDF
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
PPTX
Enhance Your Mobile Application with The Use of Blockchain Technology
PPTX
Seminar presentation on digital signature ppt
Blockchain & the future of data management
Certification Authority - Sergio Lietti
Towards Self Sovereign Identity 20180508
What to look for in a hosted supplier
Blockchain-based Solutions for Identity & Access Management
Information and data security key management and distribution
Presentation on third party authentication, virtual private networking (vpn),...
PKI Industry growth in Bangladesh
The Blockchain and the Future of Cybersecurity
ReCheck - secure digitalization
Ch12 Cryptographic Protocols and Public Key Infrastructure
Alpha Education
User Management, Enablement, Directory
ReCheck's solution for decentralised login
Security Model of Blockchain
Blockchain consulting services
PoW vs. PoS - Key Differences
The Future of Authentication - Verifiable Credentials / Self-Sovereign Identity
Enhance Your Mobile Application with The Use of Blockchain Technology
Seminar presentation on digital signature ppt
Ad

Viewers also liked (10)

PDF
รับสมัครแข่งขันเพื่อบรรจุ แต่งตั้งบุคคลเป็น พนักงานจ้าง ของเทศบาลตำบลท่าวังตา...
PDF
ISE-Elearn6 - View Certificate
PPTX
Like a Broken Vessel
PDF
fusecoders-media-kit
PPTX
JVSZ 2016 - Munkavállalói értékpapír-juttatási programok RSM Hungary
PDF
Hem ankle rehab reviews
PDF
9.การขออนุญาตเจาะน้ำบาดาล.กองช่าง
PDF
4.การชำระภาษีโรงเรือนและที่ดิน.กองคลัง
PDF
15.การรับแจ้งเรื่องราวร้องทุกข์
PDF
14.การขอใบอนุญาตกิจการที่เป็นอันตราย.กองสาธารณสุข
รับสมัครแข่งขันเพื่อบรรจุ แต่งตั้งบุคคลเป็น พนักงานจ้าง ของเทศบาลตำบลท่าวังตา...
ISE-Elearn6 - View Certificate
Like a Broken Vessel
fusecoders-media-kit
JVSZ 2016 - Munkavállalói értékpapír-juttatási programok RSM Hungary
Hem ankle rehab reviews
9.การขออนุญาตเจาะน้ำบาดาล.กองช่าง
4.การชำระภาษีโรงเรือนและที่ดิน.กองคลัง
15.การรับแจ้งเรื่องราวร้องทุกข์
14.การขอใบอนุญาตกิจการที่เป็นอันตราย.กองสาธารณสุข
Ad

Similar to Pki part 1 (20)

PDF
Explain the role of the certificate authority and registration autho.pdf
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
PDF
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
PDF
www.ijerd.com
PPTX
Digital-Signatures.pptx POWERPOINT PRESENTATION FOR class
PPTX
Digital signature and certificate authority
PPT
Public Key Infrastructure and Application_Applications.ppt
PPT
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
PDF
Digital certificate management v1 (Draft)
PDF
Authentication and Authorization Models
PPT
PKI_Applications digital certificate.ppt
PDF
Security Terms and Concepts in Cloud Computing
PPT
E collaborationscottrea
PPTX
DISTRIBUTED SECURITY: Promoting Security.pptx
PDF
Ijarcet vol-2-issue-7-2307-2310
PDF
Ijarcet vol-2-issue-7-2307-2310
PPT
PKI and Applications
PPT
Managing IT security and Business Ethics
PPTX
PKI-Architecture-Securing-the-Digital-World.pptx
PPTX
public key infrastructure
Explain the role of the certificate authority and registration autho.pdf
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
317c0cdb 81da-40f9-84f2-1c5fba2f4b2d
www.ijerd.com
Digital-Signatures.pptx POWERPOINT PRESENTATION FOR class
Digital signature and certificate authority
Public Key Infrastructure and Application_Applications.ppt
Authorization Policy in a PKI Environment Mary Thompson Srilekha Mudumbai A...
Digital certificate management v1 (Draft)
Authentication and Authorization Models
PKI_Applications digital certificate.ppt
Security Terms and Concepts in Cloud Computing
E collaborationscottrea
DISTRIBUTED SECURITY: Promoting Security.pptx
Ijarcet vol-2-issue-7-2307-2310
Ijarcet vol-2-issue-7-2307-2310
PKI and Applications
Managing IT security and Business Ethics
PKI-Architecture-Securing-the-Digital-World.pptx
public key infrastructure

Pki part 1

  • 2. “An enterprise-wide service (i.e. data integrity, user identification and authentication, user non-repudiation, data confidentiality, encryption, and digital signature) that supports digital signatures and other public key-based security mechanisms for Department of Defense functional enterprise programs, including generation, production, distribution, control, and accounting of public key certificates. A public key infrastructure provides the means to bind public keys to their owners and helps in the distribution of reliable public keys in large heterogeneous networks. Public keys are bound to their owners by public key certificates. These certificates contain information such as the owner's name and the associated public key and are issued by a reliable certification authority. Also called PKI.” (Dictionary of Military and Associated Terms, 2005)”
  • 3. Creating, Distributing, and Storing Digital Certificates  Pair of Public and Private (Secret) Key  Managed by a Certificate Authority  Public Key= visible to all  Private key= secret (only certain users have access)  Private key encrypts and decrypts messages
  • 4. Certificate Authority (CA)  Responsible for issuing and verifying certificates  Registration Authority (RA)  Identify and Verify the user before CA  Central Directory  Secure location to store and index keys from CA  Certificate Management Authority  Determines roles and responsibilities in management and distribution of certificates.

Editor's Notes

  • #4: A Public-key infrastructure system revolves around creating, distributing, and storing digital certificates. These digital certificates verify that a person is who they say they are through digital signatures that identify the identity of a user. Public-key infrastructure consists of a pair of a public and a private cryptographic key that bind users on an insecure network. These keys are created, controlled, stored, and distributed through a trusted authority, also known as a Certificate Authority. While the public key may be visible to all users in a network, private keys are hidden and may only be visible to certain users who have obtained access. The key is responsible for encrypting and decrypting messages, so it is intended to be secret with only certain users given access to the private key in order to decrypt messages. Therefore, businesses and government agencies often go to extreme lengths to keep keys secret, because if it is intercepted, messages can be decrypted by unintended users.
  • #5: Public key infrastructure systems consist of a Certificate Authority (CA), a Registration Authority (RA), a Central Directory, and a Certificate Management System (Vacca, 2004). The Certificate Authority is responsible for issuing and verifying digital certificates. The Registration Authority acts as a third party intermediary between the user and the Certificate Authority; the RA is responsible for maintaining lists of codes that identify and verify the user for access to the CA. The RA and CA may or may not be separate, depending on the framework. The Central Directory represents a location that is secure and responsible for the storing and indexing of keys by the Certificate Authority. The Certificate Management System (CMS) determines the roles and responsibilities in the managing and distribution of certificates.